Artificial intelligence (AI) कम्प्यूटर के क्षेत्र में डीपफेक बन गया है बड़ा खतरा
किसी का चेहरा – किसी का नाम ( डीपफेक) AI (एआइ) की मदद से तैयार किए जाने वाले कंटेंट को डीपफेक कहा जाता है। इसमें वीडियो और आडियो दोनों शामिल…
किसी का चेहरा – किसी का नाम ( डीपफेक) AI (एआइ) की मदद से तैयार किए जाने वाले कंटेंट को डीपफेक कहा जाता है। इसमें वीडियो और आडियो दोनों शामिल…
हाल में अभिनेत्री रश्मिका मंदाना का एक डीपफेक वीडियो वायरल हुआ, जिसमें किसी और के चेहरे पर उनका चेहरा लगा दिया गया। एआइ का कितना दुरुपयोग हो सकता है, उसे…
वीडियो कालिंग के दौरान बार-बार आवाज और वीडियो में व्यवधान की समस्या बहुत आम है। बार-बार वीडियो काल के डिस्कनेक्ट होने की समस्या से परेशान हो चुके हैं, तो एक…
आजकल लोगों के पास इतनें आनलाइन अकाउंट हो गए हैं कि सभी का पासवर्ड याद रखना बेहद मुश्किल है। अब गूगल इसका समाधान लेकर आया है। गूगल ने अपनी सभी…
What is JavaScript? JavaScript is a lightweight scripting programming language primarily used for creating interactive front-end web applications. It was first developed in 1995 by Brendan Eich while working at…
Types of Computer Language ( Introduction ) Computer language is a code or syntax that helps to write programs or specific applications. It is usually used to communicate with computers.…
Introduction 1. Sixth Sense is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that…
What is Tongue Biometric – ID Recognition Technology? Biometric Identification Techniques:- The word “Biometrics” means “life measurement” which is usually related to the use of distinctive physiological characteristics to identify…
What is Nokia Morph Technology? 1. The Nokia Morph is known as nanotechnology concept. 2. It developed by Nokia Research Center (NRC) , University of Cambridge (UK). 3. The Morph…
What is Wireless Sensor Network? Introduction A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions,…
What is Bluejacking Technology? Introduction 1. BLUEJACKING is the sending of unwanted messages over Bluetooth – enabled devices. 2. Bluejacking do not remove or alter any data from the device. …
What is Ethical Hacking Technology? Introduction 1. An ethical hacker is an individual hired to hack into a system to identify and repair potential vulnerabilities , effectively preventing exploitation by …
Introduction 1. Jini technology provides a simple infrastructure for delivering services (application, database, printing, storage etc) in a network and for creating an interaction between programs that use these services…
INTRODUCTION 1. Its diameter is 6 inch. 2. It is having 120×120mm motherboard. 3. It has projector instead of display unit. 4. It has virtual keyboard. 5. This computer has…
What is sensor technology? A Sensor is a device that measures a physical quantity and convert into a signal which can be read by an observer or by an instrument.…
WHAT IS 5 PEN PC TECHNOLOGY? Introduction:- Computer affects our life in a much bigger way then most of us might have thought. It has become a compulsory requirement in…
1. The value of the following MS Excel formula ……….. [ =MOD (11,3) ] (A) 33 (B) 4 (C) 14 (D) 2 2. Which of the following tools can be…
1. IMAP, an email related protocol but what is the full form of IMAP? (A) Internet Media Access Protocol (B) Intranet Media Access Protocol (C) Internet Message Access Protocol (D)…
1. State whether the following statements are true or false. (i)In MS Word, “Landscape” is a valid page margin option (ii)In MS Word, “Portrait” is a valid page margin option…
1. Which of the following is a features used to type very small letters or numbers just above the text line? (A)Subscript (B) Superscript (C) Strike Through (D) Format painter…